[an error occurred while processing this directive]

Kevin S. Bauer

Elahi, T., Bauer K., AlSabah, M., Dingledine, R., Goldberg, I., Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor, ACM Workshop on Privacy in the Electronic Society, WPES 2012, Raleigh, NC, October 15, 2012.

AlSabah, M., Bauer, K., Goldberg, I., Enhancing Tor's Performance using Real-time Traffic Classification, 19th ACM Conference on Computer and Communications Security, CCS 2012, Raleigh, NC, October 16-18, 2012.

Jansen, R., Bauer, K., Hopper, N., Dingledine, R., Methodically Modeling the Tor Network, 5th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2012, Seattle, WA, August 6, 2012.

Wang, T., Bauer, K., Forero, C., Goldberg, I., Congestion-aware Path Selection for Tor, 16th International Conference on Financial Cryptography and Data Security, FC 2012, Bonaire, February 27–March 2, 2012.

Drachen, A., Bauer, K., Veitch, R., Distribution of Digital Games via BitTorrent, 15th ACM SIGMM/SIGCHI International Academic MindTrek Conference, Tampere, Finland, September 2011.

Bauer, K., Sherr, M., McCoy, D., Grunwald, D., ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation,  4th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2011, San Francisco, CA, August 8, 2011.

AlSabah, M., Bauer, K., Goldberg, I., Grunwald, D., McCoy, D., Savage, S., Voelker, G., DefenestraTor: Throwing out Windows in Tor, 11th Privacy Enhancing Technologies Symposium, PETS 2012, Waterloo, Canada, July 27–29, 2011.

Drachen, A., Bauer, K., Veitch, R., Only the Good... Get Pirated: Game Piracy Activity vs. Product Features (short paper), 6th Foundations of Digital Games, Bordeaux, France, June 28-July, 2011.

Gonzales, H., Bauer, K., Lindqvist, J., McCoy, D., Sicker, D., Practical Defenses for Evil Twin Attacks in 802.11, IEEE Globecom Communications and Information Security Symposium, GLOBECOM 2010, Miami, FL, December 6-10, 2010.

Grunwald, D., Beach, A., Bauer, K., Lv, Q., Sicker, D., The Risks and Regulation of Location, 38th Research Conference on Communication, Information and Internet Policy, TPRC 2010, Arlington, VA, October 1-3, 2010.

Adams, J.T., Bauer, K., Hardcastle, A., Grunwald, D., Sicker, D., Automated Tracking of Online Service Policies, 38th Research Conference on Communication, Information and Internet Policy, TPRC 2010, Arlington, VA, October 1-3, 2010.

Bauer, K., Juen, J., Borisov, N., Grunwald, D., Sicker, D., McCoy, D., On the Optimal Path Length for Tor, 3rd Hot Topics in Privacy Enhancing Technologies, HotPETS 2010, Berlin, Germany, July 24, 2010.

Bauer, K., Grunwald, D., Sicker, D., Predicting Tor Path Compromise by Exit Port, 2nd IEEE International Workshop on Information and Data Assurance, Phoenix, AZ, December 11, 2009.

Bauer, K., McCoy, D., Grunwald, D., Sicker, D., BitStalker: Accurately and Efficiently Monitoring BitTorrent Traffic, 1st IEEE International Workshop on Information Forensics and Security, WIFS 2009, London, United Kingdom, December 6-9, 2009.

Bauer, K., McCoy, D., Anderson, E., Breitenbach, M., Grudic, G., Grunwald, D., Sicker, D., The Directional Attack on Wireless Localization - or – How to Spoof Your Location with a Tin Can, IEEE Globecom Communications and Information Security Symposium, GLOBECOM 2009, Honolulu, HI, November 30-December 4, 2009.

Bauer, K., Grunwald, D., Sicker, D., The Arms Race in P2P, 37th Research Conference on Communication, Information, and Internet Policy, TPRC 2009, Arlington, VA, September 25-27, 2009.

Bauer, K., McCoy, D., Greenstein, B., Grunwald, D., Sicker, D., Physical Layer Attacks on Unlinkability in Wireless LANs, 9th Privacy Enhancing Technologies Symposium, PETS 2009, Seattle, WA, August 5-7, 2009.

Anderson, E., Phillips, C., Gonzales, H., Bauer, K., Grunwald, D., Sicker, D., SniffMob: Inferring Human Contact Patterns using Wireless Devices, 1st ACM International Workshop on Hot Topics in Planet-Scale Measurement, HotPlanet 2009, Krakow, Poland, June 22, 2009.

Bauer, K., Grunwald, D., Sicker, D., The Challenges of Stopping Illegal Peer-to-Peer File Sharing, National Cable & Telecommunications Association Technical Papers, Washington, D.C., April 2009.

Bauer, K., Gonzales, H., McCoy, D., Mitigating Evil Twin Attacks in 802.11, 1st IEEE International Workshop on Information and Data Assurance, Austin, TX, December 9, 2008.

Bauer, K., McCoy, D., Grunwald, D., Sicker, D., BitBlender: Light-Weight Anonymity for BitTorrent, ACM Workshop on Applications of Private and Anonymous Communications, Istanbul, Turkey, September 2008.

McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D., Shining Light in Dark Places: Understanding the Tor Network, 8th Privacy Enhancing Technologies Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008.

Bauer, K., McCoy, D., Greenstein, B., Grunwald, D., Sicker, D., Using Wireless Physical Layer Information to Construct Implicit Identifiers, 1st Hot Topics in Privacy Enhancing Technologies, HotPETS 2008, Leuven, Belgium, July 26, 2008.

Anderson, E., Phillips, C., Bauer, K., Grunwald, D., Sicker, D., Modeling Directionality in Wireless Networks (short paper), ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, Annapolis, MD, June 2-6, 2008.

Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D., Low-Resource Routing Attacks Against Tor, ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, October 29, 2007.

Bauer, K., Lee, H., A Distributed Authentication Scheme for a Wireless Sensing System, 2nd International Workshop on Networked Sensing Systems, San Diego, CA June 27-28, 2005.

 

top of page